0% found this document useful (0 votes)
4 views

Computing - Dec 24

The document outlines the end-of-term examination for Basic 7 and Basic 8 Computing at Christ International School, scheduled for December 2024. It includes two sections with various questions on computing concepts, algorithms, computer generations, and the OSI model, requiring students to demonstrate their knowledge through diagrams, explanations, and evaluations. Each paper is structured to assess both theoretical understanding and practical application in computing.

Uploaded by

blaqcanadian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computing - Dec 24

The document outlines the end-of-term examination for Basic 7 and Basic 8 Computing at Christ International School, scheduled for December 2024. It includes two sections with various questions on computing concepts, algorithms, computer generations, and the OSI model, requiring students to demonstrate their knowledge through diagrams, explanations, and evaluations. Each paper is structured to assess both theoretical understanding and practical application in computing.

Uploaded by

blaqcanadian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

CHRIST INTERNATIONAL SCHOOL – DANSO

END OF FIRST TERM EXAMINATIONS – DECEMBER 2024


COMPUTING – BASIC 7 2 hours
NAME: …………………………………………………………………….. DATE: ………………………...
PAPER 2 [60 marks] 1 ¼ hour
This paper contains two sections. A and B. Answer Question 1 in Section A and any other three questions in
Section B.
SECTION A
Compulsory [24 marks]
1a. Study the diagram below carefully and use it to answer the questions that follow.

i. What does the diagram above represents? [3marks] …………………………………………………..


ii. Name the parts labelled A, B, C [9marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. Draw a well-labelled single CPU chip. [12marks]
GENERAL KNOWLEDGE IN COMPUTING [36marks]
Answer only three questions from this section.
2a. Explain the four main parts of the computer with an example each. [8marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. As a friend of Christabel, differentiate between Input and Output devices to her with examples.
[4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………

3a. Explain the term Storage devices. [2marks]


…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. State three types of storage device with two example each. [6marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
c. Mention two differences between Floppy disk and a Hard disk. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
4a. Esther was absent from school when Sir Jason taught Microchips. As a good friend of Esther, in not
less than two lines, briefly describe the computer’s microchip to her. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. Mention three main parts of the CPU. [6marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
c. What is the main function of the CPU?
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
5a. Briefly explain the first generation of computers to your father, who knows nothing about generation
of computers. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. Your father wants to buy a laptop for you to aid you in your computing studies, your father spoke to
Sir Jason and he advised your father to buy fourth generation of computer instead of third generation.
State two reason why Sir Jason asked your father to buy fourth generation of computer. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
c. Explain what peripheral devices are and give three examples of peripheral devices.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
SECTION A [40marks]
45 MINUTES

1. One advantage of the fourth generation of A. 80KB B. 1.2MB


computers is that C. 1.44MB D. 144MB
A. it is expensive 8. After work, Kelvin’s mother decided to
B. it consumes more power bring a copy of the data home to work on.
C. it is fast and portable Which of the following storage devices
D. it is very bulky would Kelvin advise his mother to use?
2. In a computer shop, Caleb advised Tijani I. RAM II. Pen drive
to buy a fifth generation computer due to III. External Hard disk
its feature that uses A. I and II only B. I, II and III
C. I and III only D. II and III only
A. microprocessor 9. Which of the following devices has the
B. artificial intelligence largest storage capacity?
C. vacuum tube based A. Hard disk B. DVD
D. integrated circuit based C. Floppy disk D. CD
3. Why would Ohenewaa get angry when her 10. Which of the following devices is not an
father buys her a second generation of input device?
computer instead of fifth generation?
A. Second generations are inexpensive A. Keyboard B. Mouse
B. Second generations are portable C. Pen drive D. Scanner
C. Second generations are fake
11. One advantage of hard disk over CD is that
D. Second generations are not faster
A. Hard disk is expensive than CD
4. The stage where data or command is entered
into the computer is the……….. B. Hard disk have larger storage capacity
A. Input stage B. output stage
C. Hard disk is easier to get missing
D. Storage stage D. Processing stage
D. Hard disk have spinning platters
5. OMR stands for
A. Optical Mouse Recognition 12. Bernard told his classmates that, there is a
B. Optical Magnetic Recognition part of the CPU that does mathematical
C. Optical Monitor Recognition
operation. Which is true, so which part
D. Optical Mark Recognition
does the operations?
6. An optical disc that can have data written
A. Registers B. Control Unit
onto and delete, is called a…….
C. ALU D. Memory Unit
A. CD – ROM B. CD – R
13. A small, high-speed memory storage
C. CD – RW D. DVD – ROM
locations within the CPU is the
7. The storage capacity of the 3 ½ floppy
A. Cache memory B. Memory unit
disk is
C. Control Unit D. Registers
14. Fifth generation of computers use ……… A. 1968 B. 1977
A. microprocessor C. 1986 D. 1967
B. artificial intelligence 23. Which of the following is not an advantage
C. vacuum tube based of SATA drives?
D. integrated circuit based A. They transfer data fast
15. The type of technology used in third- B. They have thinner cable
generation computers was C. They consume more power
A. Integrated circuits B. Transistors D. They are very reliable
C. Vacuum tubes D. Microprocessors 24. SATA drives were replaces with
16. What was replaced in place of transistors A. PATA B. SCSI
in 3rd Generation Computers? C. eSATA D. Floppy Disks
A. IC B. CPU 25. Which of the following devices is faster
C. RAM D. Capacitors speed in data accessing?
17. UNIVAC is an example of ……….. A. Hard disk B. DVD
generation of computer. C. Floppy disk D. CD
A. third B. second 26. The small images that represents files on a
C. First D. fourth desktop is
18. The biggest developers of microprocessor A. wallpaper B. taskbar
is C. icons D. start button
A. Intel Cooperation B. HP Company 27. The long bar at the bottom of the windows
C. Dell Computers D. Windows desktop is known as
19. The first intel microchip is A. Start button B. Taskbar
A. Intel 504 B. Intel 408 C. Title bar D. Notification area
C. Intel 404 D. Intel 800 28. The time and date are found on the……
20. A…… is a thin plastic with magnetic A. Menu bar B. Title bar
coating on one side on which data is C. Start button D. Taskbar
stored. 29. The All Programs can be accessed from
A. Magnetic tape B. Hard disk the
C. Optical disc D. Floppy disk A. Start button B. Notification area
21. The first type of hard disk was C. Icons D. Desktop
A. PATA B. SATA 30. The………is the main interface the
C. SCSI D. eSATA computer user uses to interact with the
22. The Parallel Advanced Technology computer system.
Attachment drives were introduced by A. Graphical User Interface
Western Digital back in….. C. Graphic User Interface
C. Graphical User Internet A. File allocation B. File management
D. Graphic User Internet C. File keeping D. File extensions
31. The pane that shows recently started
programs or any pinned program shortcut 37. The ending of a file that helps identify the
is the type of file in operating system is
A. left pane B. right pane A. File allocation B. File management
C. center pane D. top pane C. File keeping D. File extensions
32. The……..allows you to select options like; 38. Which of the following is NOT a point to
shutdown, restart, sleep or hibernate. consider when naming a file?
A. Shutdown dialog box A. Use special characters or spaces
B. Desktop dialog box B. Avoid using non-alphanumeric
C. Control Panel characters
D. Wallpaper C. Use capital letters and underscore
33. On the windows 7 or 11 taskbar, the next instead of periods
bar close to the Start button is the D. Avoid unnecessary repetition and
A. Spacebar B. Title bar redundancy in file name paths.
C. Search bar D. Notification bar 39. A document that may contain text created
34. Date and Time, is located on the…….side by using application software saved by
of the taskbar. default name extension is
A. left B. center A. File B. Folder
C. top D. right C. Sub-folder D. Resource
35. An image or picture that appears on the 40. Arhin Simon downloaded a picture of
desktop screen when the computer is Cristiano Ronaldo from the internet, the
turned on is……… picture had a certain extension. Which of
A. Wallpaper B. Desktop screen the following file extensions is correct for
C. Notification image D. Search image the picture Simon downloaded?
36. The process of arranging and organizing A. .docx B. .png
files and documents kept on the computer C. .xls D. .mp3
system is termed as…….
CHRIST INTERNATIONAL SCHOOL – DANSO
END OF FIRST TERM EXAMINATIONS – DECEMBER 2024
COMPUTING – BASIC 8 2 hours
NAME: …………………………………………………………………….. DATE: ………………………...
PAPER 2 [60 marks] 1 ¼ hour
This paper contains two sections. A and B. Answer Question 1 in Section A and any other three questions in
Section B.
SECTION A
Compulsory [24 marks]
1a. Write an algorithm in both pseudocode and flowchart format for adding four numbers and display the
results. [12marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. Draw flowchart for the following; [12marks]
i. Iteration statement
ii. If statement
iii. Flow control statement
GENERAL KNOWLEDGE IN COMPUTING [36marks]
Answer only three questions from this section.
2a. Given that a = 4, b = 5 and c = 8, evaluate the following using the operators in programming:
[5marks]
i. (a < b) && (a < c)
ii. (a != c) || (b < a)
iii. (b == c) && (b > a)
iv. ( c != a) && (c == b)
v. (b < c) || (a != b)
bi. Explain the term translator [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii. State the three types of translators. [3marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
3ai. What is an algorithm? [3marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii. State three characteristics of an algorithm. [3marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. Explain the following concept in programming. [6marks]
i. Variables
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii. Constants
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
iii. Loop (Iteration)
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
4a. Mention four essence in using Robots in manufacturing establishment over human beings. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. State the function of the following concepts of a robot; [6marks]
i. Microprocessor
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii. Actuators
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
iii. Sensors
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
c. Explain Artificial Intelligence
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
5a. In the right order, list all the seven layers of the OSI Model. [7marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. At which level of the OSI model does the following operates; [5marks]
i. TCP/UDP ports ………………………………………………………………………………………..
ii. MAC Address …………………………………………………………………………………………
iii. Routers …………………………………………………………………………………………………
iv. Cables ………………………………………………………………………………………………….
v. IP addresses ………………………………………………………………………………………...….
SECTION A [40marks]
45 MINUTES

1. According to Florence, there is another diagram. The appropriate symbol he will


name for Low-level language, this other use at the input stage of the activity is
name is……….. A. parallelogram B. rhombus
A. Machine Language C. oval D. rectangle
B. Assembly Language 8. Basic 8 students of Christ International
C. Basic Language wants to have a group discussion on an
D. System Language assignment given to them by their Science
2. In computer programming, debugging is a teacher. Which of the social media
technique used to platforms below will enable them to post
A. test a code questions, answers and start a discussion?
B. create bugs intentionally A. Pinterest B. WhatsApp
C. write codes to play games C. LinkedIn D. YouTube
D. fix errors in code 9. In computing class, Rhamin said the field
3. Sabina entered 20 into a computer as of science and engineering which involves
quantity of pencils bought. How will the the design, construction and use of
computer see the figure entered? machines to perform tasks done
A. 11001 B. 10010 traditionally by humans is…………
C. 10100 D. 10011 A. Artificial Intelligence
4. The central device that communicates with B. Robotics
other devices and manages resources is a C. Heuristic Learning
A. client B. server D. Machine Learning
C. switch D. hub 10. ……..refers to the task of automatically
5. Which of the following instructs a program determining the location of a robot in a
to repeat a series of statements a specific complex environment.
number of times? A. GPS B. Localization
A. Series B. Sequence C. Digital compass D. Tilt sensor
C. Loop D. Assignment 11. What is the purpose of “for” loop in
6. The reason why most programmers had programming?
difficulties in using Machine Language A. To make decisions
was that it was........ B. To repeat a block of code a specific
A. error-prone B. easy to write number of times
C. made for machines D. well arranged C. To store data
7. Sir Jason tasked Christopher to D. To define a function
demonstrate an activity using a flowchart
12. One disadvantage of using robots in A. Sharing files B. Communication
manufacturing establishments over human C. Sharing software D. Hacking
beings is that…… 19. Which of the following is not a criteria a
A. Robots never get bored computer network must meet?
B. Robots can be used in conditions that A. Refresh rate B. Response time
are hazardous to humans C. Transmit time D. Performance
C. The use of robots substantially reduces 20. The device that enables the holding of an
labour cost object to be manipulated by the robot is
D. Maintenance of Robots are very costly A. Piston B. Motor
13. The introduction of Artificial Intelligence C. Gears D. Gripper
has come with its related ethical concerns 21. The main address to which your home or
such as business is connect and connects you to
A. job creation the world, which is unique to all users is
B. bias in algorithm A. Private IP address
C. improved healthcare B. Public IP address
D. increased productivity C. Dynamic IP address
14. Elizabeth told her classmates that, D. Static IP address
the……. Of the robot acts as the brain. 22. DHCP is the acronym for
A. Microprocessor B. Actuators A. Dynamic Host Configuration Protocol
C. Sensor D. Encoders B. Dynamic Host Confirmed Protocol
15. A temporary address for devices connected C. Denial Host Configuration Protocol
to a network that continually changes over D. Denial Host Confirmed Protocol
time is known as……….……..address 23. The OSI model was developed by
A. Static IP B. Private IP A. International Standards Organization
C. Dynamic IP D. Designated IP B. Internal Standards Organization
16. Routers make decisions based on……….. C. National Standards Organization
A. MAC addresses B. Cables D. Intercontinental Standards Organization
C. Hubs D. IP addresses 24. At which layers of the OSI model is
17. Sadiq and Osman connected their considered as the hardware layers?
computers to share resources. This act is A. Layer 1-4 B. Layer 1-3
termed as C. Layer 5-7 D. Layer 4-6
A. computer network B. computer sharing 25. Routers operates at the…………..of the
C. resource network D. resource sharing OSI model.
18. Which of the following is not a primary A. Physical layer B. Data link layer
use of a computer network? C. Network layer D. Transport layer
26. The most common cable used in 33. 192.152.672.1
connecting computers to the internet is A. Class A B. Class B
A. Coaxial cable B. Data cable C. Class C D. Localhost
C. Twisted pair cable D. Fiber Optic cable 34. 222.244.38.107
27. The unique address that identifies a A. Class A B. Class B
website is the C. Class C D. Localhost
A. resource address B. web address 35. 127.87.12.34
C. IP address D. user address A. Class A B. Class B
28. The basic protocol that runs the whole C. Class C D. Localhost
internet is the 36. 100.150.200.251
A. FTP B. HTTP A. Class A B. Class B
C. UDP D. TCP/IP C. Class C D. Localhost
29. 162.193.88.14 depicts a/an 37. 82.3.105.03
A. IP address B. web address A. Class A B. Class B
C. email account D. email address C. Class C D. Localhost
30. The two versions of IP addresses are 38. Eli wrote a valid identifier to explain how
A. IPv4 and IPv5 B. IPv3 and IPv6 to name variables. Which of the identifiers
C. IPv4 and IPV6 D. IPv3 and IPv5 is NOT valid?
31. The diagrammatic representation of A. _a23 B. Hello World
algorithm in programming is known as C. a123 D. class_Score
A. Pseudocode B. Flowchart 39. The IP address range for Class A IP
C. Looping D. Selection address is………
32. Apetorvi Bless is able to post his pictures A. 128 to 191 B. 192 to 223
of Twitter(X), Facebook and send C. 1 to 126 D. 127 to 225
messages to his classmates. He is able to 40. Elizabeth said before a router can send
do all these because of………………… packets to a device, it makes use of
who brought Nanotechnology to Ghana. A. MAC addresses B. Subnet mask
A. Thomas Nkansah B. Thomas Edison C. Data Links D. IP addresses
C. Thomas Nsiah D. Thomas Mensah
From question 33 to 37, determin whether the IP
addresses are under which Classes of address.
CHRIST INTERNATIONAL SCHOOL – DANSO
END OF FIRST TERM EXAMINATIONS – DECEMBER 2024
COMPUTING – BASIC 8 2 hours
NAME: …………………………………………………………………….. DATE: ………………………...
PAPER 2 [60 marks] 1 ¼ hour
This paper contains two sections. A and B. Answer Question 1 in Section A and any other three questions in
Section B.
SECTION A
Compulsory [24 marks]
1a. Write an algorithm in both pseudocode and Flowchart format for adding six numbers and display the
results. [8marks]
b. Write a possible IF-THEN statement for an imaginary expert system to execute the statements below;
[8marks]
i. You are a Monday born and a female which means you are called Adwoa
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii. You are a Teacher and teaches Computing, therefore your salary is $4000.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
c. Study the diagram carefully and use it to answer ci and ii.

i. What is the name of the image shown above? [3marks] ……………………………………………..


ii. Describe to your colleagues, how the image shown above is accessed for information. [5marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
GENERAL KNOWLEDGE IN COMPUTING [36marks]
Answer only three questions from this section.
2a. Abu, the leader of a class does not understand the difference between CC and BCC feature in an e-
mail. Explain to Abu, the difference between the two. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. Differentiate between e-mail address and e-mail account. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
c. Identify the parts labelled I to IV. [4marks]

…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
3a. Explain what hacking is to your sister who is a non-tech personnel. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. Explain the following terms as used in Information Security, [8marks]
i. Virus
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii. Cyberstalking
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
iii. Cyberbullying
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
iv. Digital Shadow
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
4a. Explain what computer network is. [2marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
bi. Mention the four market segment E-commerce operates in. [2marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
ii. Mention four examples of E-commerce. [2marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
c. State two advantages and disadvantages of online banking. [4marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
d. Explain how mobile money payment system works. [2marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
5a. What is E-learning. [2marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
b. Mention four merits and demerits each of E-learning. [8marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
c. Explain two importance of social media to a Generation Alpha who think social networking has
caused more damage to society. [2marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
SECTION A [40marks]
45 MINUTES

1. The purpose of computer programming is A. Break B. Continue


to find a…….of instructions that solve a C. Pass D. Loop
specific problem. 9. A set of instructions designed to perform a
A. command B. sequence specific task is known as
C. outcome D. accuracy A. Flowchart B. Function
2. Which of the following programming C. Algorithm D. Sequence
languages was originally developed by 10. The diagrammatic representation of
America’s Massachusetts Institute of algorithm in programming is known as
Technology? A. Pseudocode B. Flowchart
A. Scratch B. Snap C. Looping D. Selection
C. Sprites D. Spike 11. …………..is a named data item with a
3. The binary equivalence for 2910 is value which does not change during the
A. 111012 B. 101112 course of program execution.
C. 100112 D. 111102 A. Constant B. Value
4. The hexadecimal equivalence for 1516 is C. Variable D. Float
A. 101012 B. 100012 12. Mills protected her data from any
C. 11012 D. 11112 unauthorized user or access on her
5. The repetition of a series of instructions in computer network. This is termed as
computer programming is known as computer
A. sequencing B. Iteration A. Security B. Safety
C. Conditioning D. Varying C. Reliability D. Fairness
6. The form of algebra in which all values are 13. Jessica uses Amazon to buy all her items
related to either TRUE or FALSE is and sells her unwanted stuff on Jiji Ghana.
known as This business model is known as……
A. Expression B. Consolation A. E-Business B. E-Commerce
C. Boolean D. Systemic C. E-Consume D. E-Transaction
7. The Python programming language was 14. Which of the following payment and
developed by transfer system will be easy for Acquah to
A. Giovanni Rossum make payment as a native of Danso?
B. Guido Van Rossum A. Bitcoin B. Mobile Money
C. Giovanni Van Rossum C. Transaction card D. QR Payment
D. Charles Manners 15. The type of banking that allows a user to
8. The statement that is used to terminate the conduct financial transactions through the
loop containing it is known as internet is
A. Crawler Banking B. Web Banking inside a computer.
C. Real Banking D. Batch Banking A. Sabotage B. Cyberstalking
16. Which of the following is an advantage of C. Hacking D. Identity theft
online banking? 23. The following are forms of cybercrime
A. Efficiency B. Robustness except
C. Error-free D. Sensitive A. phishing B. intimidation
17. Kenneth takes a free Digital marketing C. spamming D. identity theft
class online, where he can access resources 24. The act of secretly listening to a
and acquire knowledge. He is making use conversation, private or otherwise of
of……… which we are not actively part is known as
A. Batch learning A. Spamming B. Identity theft
B. Section learning C. Eavesdropping D. Phishing
C. E-learning 25. Which type of hackers gain access to
D. Face to face learning systems with a view of fixing the
18. A……….network is a website that brings identified weakness?
people together to talk, share ideas and A. Ethical Hackers B. Crackers
interest or make new friends. C. Script Kiddies D. Hacktivists
A. Social B. Sharing 26. The Black hat hackers are well-known as
C. Interest D. People A. Ethical hackers B. Crackers
19. The use of digital technology to threaten, C. Script kiddies D. Phreakers
menace, harass or humiliate an individual 27. ……….are designed to gain root access or
or group is called…… administrative privileges in the user
A. cybercrime B. cyberbullying systems.
C. intimidation D. defaming A. Rootkits B. Zoombies
20. Information security programs are built C. Scareware D. Ransomware
around these objectives except….. 28. A software that monitors your activities on
A. confidentiality B. availability a computer and reveals collected
C. integrity D. robustness information to the interested party is
21. Which of the following is a computer known as…….
software attack? A. Spyware B. Bots
A. Keylogger C. Adware D. Zoombies
B. Blue Screen of Death 29. One disadvantage of E-learning is that
C. Crash A. It reduce costs
D. Trojan Horse B. It offers access to updated content
22. ………..is an attempt to exploit a C. It can lead to social isolation
computer system or a private network D. It accommodates everyone’s needs
30. The only network payment processors that A. C# B. Java
are involved in all three areas of the C. JavaScript D. C+
payment market is 38. All the following are valid data identifiers
A. Mobile Money Payment System except…..
B. MasterCard and Visa Card Payment A. _a23 B. Hello World
System C. a123 D. class_score
C. QR Code Payment System 39. The only language understood by the
D. Bitcoin and Cryptocurrency Payment computer is the
System A. Machine language
31. What application software allows user to B. Compiler
surf the interest? C. Interpreter
A. Social media B. Text editor D. Low-level language
C. Web browser D. Search engine 40. COBOL, Java, Python, C, Ruby are all
32. Opera Mini is an example of A. Middle-Level Language
A. Web browser B. Search engine B. Low-Level Language
C. Social media D. Text editor C. Machine Language
33. Which of the following is the commonly- D. High-Level Language
used cable in connecting two computers
and related devices in a network?
A. Coaxial cable
B. Fiber Optic cable
C. Ethernet cable
D. PS 2 Mechanical cable
34. A name given to computers on a network
is
A. internode B. node
C. intranode D. workside
35. The decimal equivalence for 1D8A16 is
A. 765210 B. 756210
C. 766010 D. 760610
36. The Python programming language was
developed in which year?
A. 1982 B. 1987
C. 1984 D. 1989
37. Which of the following is not a
programming language?

You might also like